首页> 外文会议>International Conference on Selected Topics in Mobile and Wireless Networking >An identification and prevention of theft-of-service attack on cloud computing
【24h】

An identification and prevention of theft-of-service attack on cloud computing

机译:云计算服务盗窃攻击的识别和预防

获取原文

摘要

Cloud computing, an emerging paradigm, has shifted the shape of computing models from technology to a utility. However, data integrity, privacy, trust and secure cloud infrastructure are amongst the major issues which can subvert the wide benefits and deployment of cloud computing. Cloud computing uses virtualization to provide scalable, efficient and low cost IT services to users. The back bone of virtualization is hypervisor which mapped logical hardware with physical hardware and make one computer appear as many. Hypervisor vulnerabilities can favor the attacker to use the VM (virtual machine) for a longer period and pay less amount by resetting/manipulating the variables (i.e. which store CPU and memory etc. usage of VM, used by user, to charge him at the end) resulting in an attack called theft-of-service attack. This attack, caused by stealing VM, can affect the cloud infrastructure financially as well as there will be no record of user's activity during his stay on cloud which lead to a greater risk to success of cloud computing. In this paper, we investigated the limitations of Kernel Virtual Machine together with the QEMU emulator in private cloud and provided the solution, in term of an API based VM's power consumption that will identify and prevent theft-of-service attack. This solution has been implemented in a private cloud to determine the efficiency of proposed API. We concluded that our API can detect and prevent theft-of-service attack in cloud with respect to different scenarios.
机译:云计算是一种新兴的范例,已将计算模型的形状从技术转变为实用程序。但是,数据完整性,隐私,信任和安全的云基础架构是可以破坏云计算的广泛利益和部署的主要问题。云计算使用虚拟化为用户提供可扩展,高效且低成本的IT服务。虚拟化的后盾是虚拟机管理程序,它可以将逻辑硬件与物理硬件映射在一起,并使一台计算机的出现数量如此多。虚拟机监控程序漏洞可以使攻击者更长时间使用VM(虚拟机),并且通过重置/操纵变量(例如,存储CPU和内存等)来减少费用,从而减少攻击者的使用量。结束)导致了一种称为“服务盗用攻击”的攻击。这种由窃取VM引起的攻击可以在经济上影响云基础架构,也不会记录用户在云上期间的活动,从而导致更大的云计算成功风险。在本文中,我们研究了基于内核的虚拟机以及QEMU仿真器在私有云中的局限性,并提供了基于API的VM功耗的解决方案,以识别并防止服务盗窃攻击。该解决方案已在私有云中实施,以确定所提出的API的效率。我们得出的结论是,针对不同的场景,我们的API可以检测并防止云中的服务盗窃攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号